FYJC- IT
CHAPTER 5 - FILE AND DISC UTILITIES
Fill In The Blanks
1. Firewalls can be used for ___________
= Software
2. __________ Access is used for processing one record after the other.
= Sequential
3. An __________ access method is direct access
= Alternative
4. An__________ is a collection of files packaged together into one compressed file.
= Archive
5. ___________ compression is used to compress data at the time of writing onto the drive.
= Disk
6. In __________ compression, loss of information is acceptable.
= Lossy
7. In__________ compression, data is compressed without any loss of data.
= Lossless
8. __________ utility is used for compression files & transferred easily.
= Winzip
9. ___________ is the technique of converting a stream of text into coded format.
= Encryption
10. Plain text converted into ________ text using encryption.
= Cipher
11. __________ utility can be used to check the hard disk for logical and physical errors.
= Scandisk
12. The memory space is broken at the time of loaded and removed into different small
pieces is known as ______
13. _________ utility is designed to reorganize non-contiguous files into contiguous files.
14. A ________ makes copies of itself on computer.
=Fragmentation
=Disk Defragmenter
= Worms
15. ___________ Software is a program that is installed on the computer to protect
the system from viruses.
16. _______ is a barrier between two networks.
= Antivirus
= Firewall
True or False
1. Computer can store information in different forms.
True
2. Every file has a name and its referred by name.
True
3. File represents programs, source and data
True
4. Data files may be numeric, alphabetic
True
5. The files have no properties.
False
6. A direct access files are of great use for immediate access
True
7. Archives are files that contain other files.
True
8. In compression, ratio of compressed the file is 6:1
False
9. Fragment means the file is not stored in one place?
True
10. Trojan horse is used to control malicious attack on the computer.
True
11. Trap door is an open entry point into a program.
False
12. Memory resident viruses reside in the memory and eat up memory space.
True
13. Polymorphic viruses change Characteristics.
True
14. Boot sector viruses attack on the hardware.
True
15. A spyware will cause the computer to run slower.
True
Multiple Choice Question (One)
1. _________ virus attack on boot sector
(a) Boot sector virus (b) Polymorphic virus (c) Slow-fast infector virus (d) None of these
Ans: Boot sector virus
2. A ____ is piece of hardware and software that sits between the computers.
1. Firewall
2. Compression
3. Win Zip
4. Spyware
Ans: Firewall
3. ____________ utility is used to checked the hard disk for physical error.
1. Scan disk
2. Boot Disk
3. Disk defragmenter
4. None of these.
Ans: Scan Disk
4. _________ is used to convert plain text into cipher text.
1. Encryption
2. Decryption
3. Public Key
4. Private Key
Ans: Encryption
5. _________ is used to convert cipher text into plain text.
1. Encryption
2. Decryption
3. Public Key
4. Private Key
Ans: decryption
6. In _______________ compression, some loss of information is acceptable.
1. Lossy
2. Lossless
3. data
4. Dsik
Ans: Lossy
7. In ______________ compression, data is compressed without any loss.
1. Lossy
2. Lossless
3. data
4. Disk
Ans: Lossless
8. CVF stand for _________
1. Compressed volume file
2. Compress Volume form
2. Compression value format
4. Common volume file.
Ans: Compressed volume file
Multiple Choice Questions (Two)
1. ________ type of compression available for compress file and data.
1. Lossy
Ans: Lossy , Lossless
2. Lossless
3. Data
4. Disk
2. ___________ key are used for encryption and decryption.
1. Private
2. Public
3. Common
4. Cipher
Ans: Private , Public
3. ________ & _______ types are used for access the information.
1. Sequential
2. Direct
3. Straight
4. Cross
Ans:
4. __________ are Encryption utility.
1. Wincry
2. Clvercyst
3. Windowtp
4. Crywin
Ans: Wincry, Clvercyst
5. __________ types of viruses available in computer system.
1. Boot sector virus
2. Polymorphic virus 3. Commodity virus 4. Disk cluster virus.
Ans: Boot sector virus, Polymorphic virus
6. Firewall give protection for _________
1. Files
2. Software
3. Hardware
4. Folders
Ans: Software, Hardware
Multiple Choice Question(Three)
1. Approaches of antivirus is _______________
1.Detection
2. Modification
3.Transformation
4.Identification
5. Removal
Ans: Detection, Identification, removal
2. Sources of computer viruses are___________
1. Printer
2. E-mail
3. Floppy Disk
4. Network
5. Print
3. Boot sector
4. Slow & fast infector
Ans: Email, floppy Disk, Network
3. Following are the types of viruses______
1. Component resident
2. Memory resident
5. Circuit resident
Ans: Memory resident, Boot sector, Slow & fast infector
CHAPTER 6 BASIC DATABASE CONCEPTS
Fill In The Blanks
1. Any collection of related information grouped together as a single item is a__________
2. ____________ are collection of facts, unorganized but able to be organized into useful information.
3. Organization collection of related data is called _________
=database
= data
= database
4. A ________ is a graphical representation of a table.
= form
5. A ____ is a database object used to display a record on the screen for adding or editing.
= form
6. ___________ is a request presented by the user to the database and the database displays its response. = query
7. To get a specific information from a table _______ is used.
= query
8. A _________ is a request for information from one or more database tables.
= query
9. A _____ is used to search a database for a specific record.
= query
10. A ________ query display summarized information.
= crosstab
11. _______ are based on the table or query.
= reports
12. __________ are used to display records in the prescribed form.
= reports
13. A ___________ is a printable presentation of data gathered from a query on a database.
= report
14. _________ key constraints can be used to enforce uniqueness as well as referential integrity.
= primary
15. A foreign key is a field that contains a value matching another tables_________ key
= primary
16. Rows in database table are called___________ records
= records
17. ________ is a collection of fields.
= record
18. Access is a _______ database
= relational
19. To display records depending on collection ___________ is used in MS-Access.
= criteria
20._________ queries are used to display as column and row headings.
= crosstab
21. A column in a datasheet or database table is called__________
= field
22. ________ database management system supports multiuser system.
23. RDBMS stnds for______
= Relational
= Relational Database Management System
24. SQL stands for
= Structured Query Language
25. DML stands for ____________
= Data Manipulation Language
26. DDL stnds for___________
= Data Definition Language
27. DCL stnds for ___________
= Data Control Language
28. _________ is used to create, maintain and query a relational database and uses regular
English words for its commands
= SQL
29. ________ produces better security to the database compared to MS-Access
= SQL
30. Whenever you want to obtain data from a table in your database, you need to use _______ statement = Select
True Or False
1. Each column of table is related to other because they all contain same type of information.
= False
2. Access is one of the good application program for spreadsheet.
= False
3. Access is created for single user computer system.
= True
4. MS- Access is relational database management system (RDBMS)
= True
5. In Access, properties of fields are set in the design view.
= True
6. MS-Access has limitation to store the number of fields.
= True
7. Rows in database table are called fields
= False
8. YES/NO indicates true or false
= True
9. A database does not allow data validation
= True
10. Access automatically assigns a unique integer to the record when the data type is number
= False
11. A primary key is used to identify each table uniquely
= False
12. Primary key is compulsory in MS-Access
= False
13. Ms-Access can support as developer tool.
= False
14. In database application sorting is possible
= True
15. Primary key allows redundant value
= False
16. SQL stands for Stored Query Language
= False
17. SQL is multiuser computer system
= True
18. In SQL high level of security is provided
= True
19. SQL provides a high level of security than Ms- Access.
= True
20. SQL is designed for single user computer system.
= True
21. SQL is used to create a view for multi-user system so that many users can see the output
= True
22. In Ms-Access processing speed is high as compared to SQL
= False
23.DDL consists of set of commands to manipulate values, which are present in the table
= False
Multiple Choice Question(One)
1. _____ are collection of facts, unorganized but able to be organized into useful information.
(a) data
(b) information
(c) fields
(d) records
(c) fields
(d) records
Ans: (a)
2. The processed data is called__________
(a) data
(b) information
Ans: (b)
3. Primary key has importance of _______
(a) uniqueness
(b) deletation
(c) first preference
(d) none of these
Ans: (a)
4. Primary keys are __________
(a) not necessary
(b) always used
(c) only used in special circumstances
(d) none of above
Ans: (b)
5. Normalizing a database will __________
(a) help to prevent redundant data
(b) run queries automatically
(c) have no effect on the accuracy on the database
(d) none of the above
Ans: (a)
6. Primary key fields____________
(a) are assigned to only field per table
(b) is more rigid than relationship
(c) are not important in the creation of relationship between tables (d) are sometimes compound keys
Ans: (a)
7. In order to relate to tables and extract information from it, they can be linked using____________
(a) form
(b) report
(c) primary key
(d) secret key
Ans: (c)
8. Tables are ___________
(a) always stored in the same database as their forms, reports and queries
(b) Sometimes stored in separate database
(c) always available in separate
(d) none of the above
Ans: (a)
9. To display records depending on condition,________ is used.
(a) forms
(b) query
(c) report
(d) macros
Ans: (b)
10. ___________ is used to accept unique values and avoid null values
(a) unique key
(b) primary key
(c) foreign key
(d) composite key
Ans: (b)
11. A row is relational database table is called ____________
(a) tuple
(b) record
(c) entity
(d) both a & b
Ans: (d)
12. _________is generally used for multi user computer systems.
(a) SQL
(b) ACCESS
(c) ASP
(d) QBE
Ans: (a)
13. SQL statements are __________
(a) used to query unrelated tables
(b) never used in access
(c) used to query only related tables
(d) none of the above
Ans: (c)
14. _________ is the particular language for relational database management system standardized by ANSI.
(a) MS-Access
(b) excel
(c) SQL
(d) visual Basic
Ans: (c)
15. ______ language enable to create and operate on relational database.
(a) SQL
(b) VB
(c) ASP
(d) Javascript
Ans: (a)
16. Correct SQL statement is___________
(a) it is the slowest database
(b) it cannot support as a developer tool
(c) SQL is used with single-user computer system
(d) It provides security for the created tables structure
Ans: (d)
Multiple Choice Question(Two)
1. _________ are the parts of database.
(a) field
(b) dates
(c) record
(d) private key
Ans: (a) and (c)
2.________ are used to create database.
(a) Ms-Access
(b) excel
(c) ASP
(d) SQL
Ans: (a) and (d)
3. _________ are database objects.
(a) open
(b) design
(c) forms
(d) table
Ans: (c) and (d)
4. In Access, following are the attributes of fields.
(a) color
(b) alignment
(c) default value
(d) field size
Ans: (c) and (d)
5. To create a table ____________ components are a necessary requirement.
(a) description
(b) data type
(c) alignment
(d) field
Ans: (b) and (d)
6. _________ and ______ keys are used in Relational Database Management System.
(a) secondary
(b) primary
(c) foreign
(d) selected
Ans: (b) and (c)
7. Features of database.
(a) quick data analysis
(b) direct multiple sorting
(c) easy to add or delete record
(e) difficult to update record
Ans: (a) and (c)
8. Following are the SQL commands
(a) DDL
(b) DML
(c) DLL
(d) DLD
(c) select
(d) add
Ans: (a) and (b)
9. The SQL statements used are
(a) modify
(b) update
Ans: (b) and (c)
10. Correct statements about SQL
(a) it can be used with multi-user system
(c) it stands for structured question language
(b) it has limitation to store number of fields
(d)it has higher capacity to store data compare to Access
Ans: (a) and (d)
Multiple Choice Question(Three)
1. The opening screen of Ms-Access shows following options:
(a) database Wizard
(b) blank Access database
Ans: (a), (b) and (d)
2. Select the objects of Ms-Access _________
(c) datasheet view
(d)open an existing database
(a) Table
(b) Primary key
(c) Report
(d) Query
(e)View
(d) view
(e) forms
Ans: (a), (c) and (d)
3. Ms-Access database includes the following object
(a) table
(b) macro
(c) worksheet
Ans: (a), (b) and (e)
4. Different Relational Database Management System are __________
(a) Excel
(b) Access
(c) word
(d) oracle
(e) outlook express
(d) DNL
(e) DCL
Ans: (b), (d) and (f)
5. SQL commands can be categorized as________
(a) DLL
(b) DDL
(c) DML
(f) DMM
Ans: (b), (c) and (e)
CHAPTER 7 TALLY
Fill in the blanks
1. _________ is one of the most popular accounting software packages that is used to record day to day
transaction.
=Tally
2. A person who owes money to the business is_________ of the business.
= debtor
3. A person whom the business owes is _________ of the business.
=Creditor
4. Tally works on the principle of entry system.
=double
5. Golden rules of classification of accounts: __________ the Receiver, __________ the Giver.
=Debit, Crdit
6. The Gateway of Tally screen is divided into ________ parts
=4
7. In Tally,____________ keys are used into shut the company.
= Alt+F1
8. In Tally, Gateway of Tally can be activated by using Ctrl+_____ keys.
=M
9. For creating new company,_______ option is selected from company information menu.
=Create Company
10. In Tally,______ Key is used to modifying or altering company data.
= Alt+F3
11. In Tally ________ key is used to change the date
= F2
12. _________ are used for recording day to day transaction.
=Vouchers
True Or False
1. A person who owes money to the business is creditor.
= False
2. Title bar of the Tally displays information about software version, release, date and time.
= False
3. For maintaining accounts, Tally requires accounting code.
= False
4. User can delete or remove a particular company by pressing Alt+D when the company is opened
in alter mode
= False
5. In Tally, configuration option affects all companies maintained in the same directory.
= True
6. User can select more than one company at a time.
= True
7. After creating company, many cash accounts can be created.
= True
8. In Tally, button bar provides quick access to different options.
= True
9. To activate gateway of Tally press Ctrl+N as a shortcut key.
= False
10. F4 key is used to take the backup in tally.
= True
11. For shutting a company, press Alt+F3
= False
12. In Tally user cannot select more than one company at a time
= False
13. In Tally, features activated through F12 key are applicable to all companies.
= True
14. In Tally, F2 key is used to change the date.
= True
15. Alt+F2 key is used to change the period of the company
= True
16. Ctrl+F2 key is used to change the period of the company
= False
17. In Tally Alt+ P short key is used for printing
= True
18. Ledgers are very important for vouchers entries
= True
19. Ledgers can be deleted when there is no transaction recorded into ledger
= True
20. Ledgers are used for recording day to day transaction
= False
21. Vouchers are used for recording day to day transaction
= True
22. Paid salary Rs 5000. This transaction entry goes into payment voucher.
= True
Multiple Choice Questions(One)
1. Total amount invested by the proprietor is called as _________
(a) Capital
(b) Investment
(c) assets
(d) cost
Ans: (a)
2. A person who owes money to the business is called a___________
(a) Creditor
(b) debtor
(c) proprietor
(d) owner
Ans: (b)
3. _________ is short key to select any activated company.
(a) F1
(b) Alt+F1
(c) F10
(d) F2
Ans: (a)
4. Short key Alt+F1 is used for _________ company option.
(a) open
(b) copy
(c) shut
(d) select
Ans: (c)
5. Tally Provides set of _________numbers of predefined groups mainly based on the traditional methods of
accounting system.
(a) 15
(b) 28
(c) 32
Ans: (b)
6. In tally F4 functional key is used to recognize ________option.
(d) 30
(a) backup
(b) period
(c) date
(d) restore
Ans: (a)
7. To activate calculator of Tally, _______ shortcut key is used.
(a) Ctrl+N
(b) Ctrl+C
(c) Ctrl+M
(d) Ctrl+G
Ans: (a)
8. Alt+F1 key is used to which are active in desktop.
(a) Shut company
(b) Select Company (c) Delete Company (d) Alter Company
Ans: (b)
9. Which are the following is submenu under Company info?
(a) Delete Company (b) Select company
(c) Save Company
(d) Restore Company
Ans: (b)
10. To activate Gateway of tally_______ shortcut key is used.
(a) Ctrl+M
(b) Ctrl+P
(c) Ctrl+O
(d) Ctrl+G
Ans: (a)
11. Using F2 functional key ________option gets activated.
(a) Restore
(b) backup
(c) period
(d) date
(c) F12
(d) Alt+F12
(c) Payment
(d) Invoice
Ans: (d)
12. To configure a company, ______key is used
(a) F4
(b) F2
Ans: (c)
13. _________is the valid Vouchers type in Tally.
(a) Journal
(b) Receipt
Ans: (a)
14. The Entire ledger is summarized in the form of a _________
(a) Journal
(b) Balance Sheet
(c) Final account
(d) Trial Balance
Ans: (d)
15. In receipt voucher, cash A/c has _________type of balance.
(a) cash
(b) journal
(c) credit
(d) debit
Ans: (d)
16. In tally, F7 key is used to select ________ voucher type.
(a) Purchase
(b) Receipt
(c) Journal
(d) payment
Ans: (c)
17. In _______ types of voucher, only bank & cash A/c are used.
(a) Receipt
Ans: (c)
(b) Payment
(c) Contra
(d) cash
Multiple Choice Questions(TWO)
1. The features of Tally are:
(a) Price of package is high
(b) Codeless accounting package
(c) Shows monthly report with graph
(d) Very difficult to operate
Ans: (b), (c)
2. Operating Screen of Tally contains following elements:
(a) Work area
(b) Product Information
(c) Select
(d) Create
Ans: (a), (b)
3. Operating screen of Tally, shows following areas:
(a) Function button
(b) Account Info
(c) Gateway of Tally
(d) Voucher info
Ans: (a), (c)
4. Ledger is a summary of all cash and credit transaction taken from:
(a) Trial Balance
(b) Journal
(c) Balance Sheet
(d) Cash Book
Ans: (b), (d)
Multiple Choice Questions (Three)
1. Company configuration menu having the option:
(a) General
(b) Delete
(c) Numeric
(d) Voucher Entry
Ans: (a), (c), (d)
2. In tally, Company Information menu having following options:
(a) Alter Company
(b) Select Company (c) Create Company (d) Close Company
Ans: (a), (b), (c)
3. In Tally, Display menu shows following options:
(a) Trial Balance
(b) Account Books
(c) Ratio Analysis
Ans: (a), (b), (d)
Rearrange the following
1. Rearrange the following steps to create new company :
(a) Select option Create Company.
(b) Press Alt+F3 key to enter Company Info menu.
(c) Screen displays company creation menu
(d) Press Enter key to accept the details of company.
(e) Fill all the information about company
Ans: (b), (a),(c), (e), (d)
2. To select company, rearrange the following steps.
(d) Day Book
(a) Select the name of company whose books of account will be updated.
(b) Press Alt+F3 to invoke the Company info menu.
(c) Tally displays list of existing companies
(d) Select the option select company by pressing S key
(e) Now user can enter the transaction.
Ans: (b), (d), (c), (a), (e)
3. To alter and modify a company following steps are used:
(a) List of companies that have been already created will be displayed by Tally.
(b) Press Alt+F3 to invoke the Company Info menu.
(c) Select the company name and press enter.
(d) Press A key to select Alter option.
(e) Select the option select company by pressing S key
Ans: (b), (e), (a), (d), (c)
4. To delete a company following steps are used:
(a) Press A key to select Alter option
(b) Select the company name to delete from hard disk.
(c) Tally displays list of companies already created.
(d) Open Gateway of Tally.
(e) Press Alt+D
(f) Press Alt+F3 to invoke Company Info menu.
Ans: (d), (f), (a), (c), (b), (e)
5. In Tally, to display ledger, following steps are used:
(a) Select ledger from the list of accounts by pressing Enter key.
(b) From Gateway of Tally select Account Info.
(c) Select Display option from single ledger.
(d) From ledger menu select single ledger.
(e) Check and verify the list of accounts.
Ans: (b), (d), (c), (a), (e)
CHAPTER 8 HTML
Fill in the blanks
1. The abbreviation of Hyper Text Markup Language is ___________
Ans: HTML
2. Paired tag is also known as ______________ tag.
Ans: Container
3. __________ is the collection of the interrelated webpages.
Ans: Website
4. ____________ attribute of anchor tag specifies the URL of target hyperlink.
Ans: href
5. __________ tag is smallest heading tag
Ans: <h6>
6. _____________ tag is used to display the Preformatted block of text.
Ans: <pre>
7. Text is displayed as it is in a browser by using _______ tag.
Ans: <pre>
8. First page of website is known as __________
Ans: Homepage
9. The greatest value that can be assigned to the size attribute of the <FONT> tag is _____
Ans: 7
10. ___________ code is used for displaying symbol in html.
Ans: ©
11. __________ code is used to give a blank space.
Ans:
12. _________ tag is used to create hyperlinks.
Ans: <a>
13. Active link color can be set by ______ attribute
Ans: alink
14. The _____ tag is used to display enclosed text as superscript.
Ans: <sup>
15. Visited link color can be set by _____ attribute.
Ans: vlink
16. ________ attribute changes default color of hyperlink.
Ans: link
17. _____ tag is used to insert an image of web page
Ans: <img>
18. In HTML, comments can be placed within the ________ tag.
Ans:<comment>
19. ______ tag is used to scroll the text on the web page.
Ans: <marquee>
20. The default value of behaviour attribute of <marquee> tag in HTML is ______
Ans: scroll
21. The overall HTML document is written within _____ tags.
Ans: <html>
22. _____ tag is used to give a visual line break to your web document.
Ans: <hr>
23. The tag is used to give strike effect to text in html.
Ans: <strike>
24. _______ attribute is used to give color to the whole web page.
Ans: bgcolor
25. ________ element makes the text one size bigger than the previous size.
Ans: <big>
26. _____ tag is used to give a hidden line break in between two lines in a HTML document
Ans: <br>
27. Monospaced text can be viewed with the _____ physical style tag in html.
Ans: <tt>
28. ______ tag is used to give a description to the table.
Ans: <Caption>
29. ____ tag is used to display textual matter, if the browser is unable to open the image in screen Ans: alt
30. Face attribute is used in ____ tag.
Ans: <Font>
31. ______ first conceived hypertext in 1965.
Ans: Ted Nelson
32. _______ is document layout and hyperlink specification language.
Ans: HTML
33. The ______ are the instructions that are written directly into the text of the document.
Ans: tags
34. To add border size _________ attribute is used in <table> tag.
Ans: border
35. In table, rows is created by ______ tag.
Ans: <tr>
36. _______ specifies how many rows a cell should take up.
Ans: rowspan
37. _________ attribute of <A> tag is used to link within a same web page
Ans: href
38. ______ tag is used to create bulleted list.
Ans: <ul>
39. HTTP stands ________
Ans: Hyper Text Transfer Protocol
40. True type fonts can be embedded on the web page with the help of _______ tag
Ans: <font>
41. HTML code is written using special delimiters is known as ______
Ans: angle brackets
42. The symbols used with the tags are together known as __________
Ans: angle brackets
43. ________ tag is used to format the size, typerface and color of the enclosed text1
Ans: <font>
44. __________ does not allow data validation
Ans: HTML
45. _______ tag is a common supported tag used in <ol> and <ul>
Ans: <Li>
46. _________ used to display the greater than sign.
Ans: >
47. _______ tag positions text on equal distance between the left and the right edges of the doc. Ans: <center>
48. ______ attribute in <HR> tag sets the color of the horizontal line.
Ans: color
49. HTML provides ______ levels of headings.
Ans: six
50. _____ is largest level of heading.
Ans: <H1>
51. ________ tag maintains the original link breaks and spacing inserted in the text.
Ans: <pre>
52. Using _____ attribute in ordered list, you can order the numbering options of the list.
Ans: start
53. The ______ tag is used to subscript the text
Ans: <sub>
54.The links created in HTML codes are called as _______
Ans: hyperlinks
55. _____ tag is used to give animation to the text in html
Ans: <Marquee>
56. The amount of spaces left between cell border and cell data can be increased with_______
Ans: Cellpadding
57. Anything between the <comment> tag is ignored only by ______ browser.
Ans: Internet Explorer
58. Default direction of marquee is _______
Ans: Right to Left
59. The _____ attribute of <font> tag changes the size of the text.
Ans: Size
60. ____ code is used for displaying < character in HTML.
Ans: <
61. ____ code is used for displaying & character in HTML.
Ans: &
62. ____ code is used for displaying @ character in HTML.
Ans: @
63. ____ code is used for displaying symbol in HTML.
Ans: ®
64. ____ code is used for displaying character in HTML.
Ans: "e;
65. ________ attribute of <Table> creates space between the cells
Ans: Cellspacing
66. ________ attribute of <Table> specifies the horizontal alignment of row or column
Ans: Align
67. ______ attribute of <td> tag specifies the number of columns that are spanned.
Ans: Colspan
68. _______ attribute gives color to the border of the table.
Ans; bordercolor
69. _______ attribute specifies the location of image
Ans: src
70. ______ tag is used to display the table heading
Ans: <th>
71. _______ tag is used to create the Bullet list
Ans: <OL>
72. _______ attribute of <Table> decides into the amount of spacing between each cell border
And the actual content of the cell
True or False
Ans: Cellpadding
1. vlink defines the color of active link in <body> tag.
Ans: False
2. bgcolor attribute used to change the text color
Ans: False
3. Background attribute is used with <body>
Ans: True
4. Perl stands for Practical Extraction report Language
Ans: True
5. In Html tables can be inserted
Ans: True
6. The thickness of horizontal line in html document cannot be changed
Ans: False
7. The hexadecimal code of the black color in html is #000000
Ans: True
8. HTML documents can be saved by .htm extension.
Ans: True
9. In HTML default font size is 3
Ans: True
10. To insert an inline image in HTML HTML the <img> tag is used.
Ans: True
11. Cols attribute is used to divide web page horizontally
Ans: False
12. VLINK is an attribute of <body> tag
Ans: True
13. The target attribute is used to display link in another window.
Ans: True
14. bgcolor is attribute of body tag
Ans: True
15. Information in HTML can not be commented
Ans: False
16. Most addresses have www after http://
Ans: True
17. <Li> tag is used to break the line
Ans: False
18. <TR> tag is used to create the table data.
Ans: False
19. Notepad is a program, which executes HTML page.
Ans: False
20. RCB uses hexadecimal numbering system.
Ans: True
21. information in HTML cannot be animated.
Ans: False.
22. RGB code is always six numbers.
Ans: True
23. In HTML can be nested.
Ans: True
24. <hr> tag displays 3 dimension bar
Ans: True
25. <S> is a physical style tag.
Ans: True
26. In HTML, tags are defined [] brackets
Ans: False
27. Tag symbol <> is utilized at the start of each HTML programming step
Ans: True
28. </> used to indicate termination of step in html document.
Ans: True
29. <p> is used to create new paragraph.
Ans: True
30. <> used to create header row
Ans: False
Multiple Choice Question (0ne)
1. A collection of linked webpage is called as ________.
(a) Website
(b) Weblink
(c) webworld
(d) Homepage
Ans: (a)
2. _______ attribute of <marquee> tag specifies the number of times the marquee to scroll.
(a) Number
(b) time
(c) repeat
(d) loop
Ans: (d)
3. Anything between tag is ignored by internet explorer _______
(a) <Ignore> (b) <tag>
(c) <comment>
(d) <body>
Ans: (c)
4. Which of the following is plain text editor.
(a) Wordpad (b) Notepad
(c) frontpage (d) Visual interder
Ans: Notepad
5. <Marquee> tag has following attribute
(a) Action
(b) start
(c) direction
(d) size
Ans: (c)
6. The language used to develop used to develop web page is
(a) HTML
(b) HTTP
(c) Browser
(d) Protocol
Ans: (a)
7. <a> tag requires ________ attribute, which specifies target URL.
(a) target
(b) src
(c) URL
(d) href
Ans: (d)
8. First page of website is called _______
(a) Webpage (b) homepage (c) front page (d) website
Ans: (b)
9. Correct syntax for adding background colour in HTML______
(a)<body bgcolour=Red> (b)<body bgcolor=Red>
(c)<body backgroundcolour=Red>
Ans: (b)
10. Correct syntax for adding background image in HTML______
(a)<body src= image.gif> (b) <body image= image.gif>
(c) <body background=image.gif>
Ans: (c)
11. <title> tag is used inside______ tag
(a) <Head>
(b) <body>
(c) outside the body tag
Ans: (a)
12. _______ is used to change the default color of a hyperlink that is already visited to the specified colour.
(a) alink
(b) Link
(c) vlink
(d) Hypertext
Ans: (c)
13. The text appearing between _____ and ______ will be displayed in italics.
(a) <I>,</I>
(b) <EM><EM>
(c) <U><U> (d) None of above
Ans: (a)
14. _____ tag is used to create new paragraph in HTML.
(a) <body>
(b) <P>
(c) <img>
(d)<para>
Ans: <P>
15. _________ code is used to create a hyperlink.
(a) <a> http: // www. w3schools.com</a>
(b) <a url= http://www.w3schools.com>w3schools.com</a>
(c) <a href = http://www.w3schools.com>w3schools.com</a>
(d)<a name= http://www.w3schools.com>w3schools.com</a>
Ans: (c)
16. The item of Unordered list is rendered by ________
(a) Alphabets (b) Special Characters
(c) Numbers (d) bullets
Ans: (d)
17. In _______ , the Broken image is shown with red color x sign.
Ans:
Internet Explorer
18. <bgsound> tag is supported in ________ Browser.
Ans: Internet Explorer.
19. _______ is an empty tag
(a) <>
(b) <OL>
(c) <Br>
(d)<HTML>
Ans: (c)<Br>
20. The default color of horizontal rule with <hr> tag is _____
(a) red
(b) green
(c) gray
(d)blue
Ans: (c)
21. To define a table row_____ tag is used
(a) <tr>
(b) <td>
(c) <row>
(d)<trow>
Ans: (a)
22. For adding image link following _______ tag is used.
(a) <p> img src= xyz.bmp</p>
(b) <a href=xyz.html><img src=micky.jpg></a>
(c) a src=xyz.html><img src=micky.jpg></a> (d) <a href=xyz.bmp>micky.jpg></a>
Ans: (b)
23. To display special characters, named entities begin with ______ symbol.
(a) @
(b) #
(c) __
(d) !
Ans: (b)
24. To horizontal line on web document ____ tag is used.
(a) <hr>
(b) <hm>
(c) <hl>
(d) <sl>
Ans: (a)
25. Anchor tag requires _____ attribute, which specifies target URL.
(a) HREF
(b) TARGET
(c) SRC
Ans: (a)
26. User can set starting value of ordered list by
(d) URL
(a) Start
(b) Type
(c) Compact
(d) Value
Ans: (a)
27. The <marquee> tag in html has attributhes.
(a) behavior
(b) bgcolor
(c) position
(d) both a & b
Ans: (d)
28. _____ tag includes blank line into the text in html document
(a) <>
(b) <tr>
(c) <br>
(d) <hr>
Ans: (c)
29. _____ A tag interprets blank space, paragraphs and line break as they appear in html source file.
(a) <pre>
(b) <tt>
(c) <html>
(d) <format>
Ans: <pre>
30. Which of the following HTML tags are related to tables.
(a) <table><tr><tt>
(b) <table><td><tr> (c) <table><td><tt> (d) <table><dt><tt>
Ans: (b)
31. The text appearing between _____ and _____ will be displayed in bold.
(a) <p>,<p>
(b) <b>,</b>
(c) <strong>,</strong>
(d) None of the above
Ans: (b)
32. The text enclosed in ______ and _____ will appear as strikethrough text.
(a) <strike>,</strike> (b)<s></s>
(c) a and b both
(d) a or b only
Ans: (c)
33. <Font> tag has following ______ attributes
(a) Type
(b) face
(c) value
(d) caption
Ans: (b)
Multiple Choice Questions (Two)
1. The align attribute is used with which of the following HTML pages.
(a) <a>
(b) <table>
(c) <marquee>
(d) <body>
Ans: (b) and (c)
2. The <marquee> tag has following attributes in HTML.
(a) Behavior (b) position
(c) Direction (d) align
Ans: (a) and (c)
3. The value of color is represented as _____
(a) #xxyyzz (where xx, yy, zz represents hex number)
(b) =xx yy zz (where xx, yy, zz represents hex number)
(c) color name
Ans: (a) and (c)
4. Which is valid physical style in HTML
(d) #EEGG (where EE,GG represents hex number)
(a) <big>
(b) <large>
(c) <small size>
(d) <i>
Ans: (a) and (d)
5. The following tags can be used as subtags for <table> tag
(a) <th>
(b) <hr>
(c) <br>
(d) <tr>
Ans: (a) and (d)
6. src attribute is used with the following tags.
(a) <frame>
(b) <img>
(c) <frameset>
(f) <marquee>
Ans: (a) and (d)
7. Following are the physical style tags
(a) <b>
(b) <ol>
(c) <em>
(d) <ss>
Ans: (a), (c)
8. Following are the attributes of <OL> tag
(a) align
(b) start
(c) type
(d) face
Ans: (b), (c)
9. Following are the attributes of <font> tag
(a) bgcolor
(b) size
(c) type
(d) face
Ans: (b), (d)
10. Following are the attributes of <hr> tag
(a) align
(b) shade
(c) width
(d) bgcolor
Ans: (a), (c)
11. Following are the attributes of <img> tag
(a) space
(b) hspace
(c) vspace
(d) size
Ans: (b), (c)
12. Following are used to define text in table cell
(a) <tt>
(b) <th>
(c) <td>
(d) <tc>
Ans: (b), (c)
13. Common attribute used in <table>, <tr> and <td> tag
(a) bgcolor
(b) color
(c) align
(d) bordercolor
Ans: (a), (c)
14. Following are the attributes of <table> tag
(a) bordercolorlight
(b) cellpadding
(c) vspace
(d) size
(c) rowspan
(d) colspan
Ans: (a), (b)
15. Following are the attributes of <th> tag
(a) bordercolorlight
(b) cellpadding
Ans: (c), (d)
Multiple Choice Question (Three)
1. The heading tags provide the alignment setting as
(a) Left
(b) Corner
(c) Center
(d) Right
(e) Bottom
(f) Top
(d) SRC
(e) MAP
(f) TARGET
(d) Black
(e) Blue
(f) Yellow
Ans: (a), (c) and (d)
2. The attributes of the <MAP> tag are as follows
(a) ALR
(b) COORDS (c) POINTS
Ans: (a), (d) and (f)
3. RGB contains following different colors
(a) Red
(b) Gray
(c) Green
Ans: (a), (c) and (e)
4. Following are the attributes of <body> tag
(a) background
(b) link
(c) color
(d) backgroundcolor (e) text
Ans: (a), (b) and (e)
5. Following are the attributes of <font> tag
(a) bgcolor
(b) size
(c) type
(d) face
(e) color
Ans: (b), (d) and (e)
6. Following are the possible value of type attribute of <OL> tag
(a) A
(b) z
(c) I
(d) 1
(e) II
(d) bgcolor
(e) size
(d) size
(e) alt
Ans: (a), (c) and (d)
7. Following are the attributes of <hr> tag
(a) align
(b) shade
(c) width
Ans: (a), (c) and (e)
8. Following are the attributes of <img> tag
(a) space
(b) hspace
(c) vspace
Ans: (b), (c) and (e)
9. Common attributes used in <table>,<tr> and <td> tag
(a) bgcolor
(b)color
(c) align
(d) border
Ans: (a), (c) and (e)
10. Following are the attributes of <table> tag
(a) bordercolorlight
(b) cellpadding
(c) vspace
(d) size
(e) bordercolordark
Ans: (a), (b) and (e)
Rearrange the following
1. The procedure to create and view HTML page
(a) Save the file with the HTML extension (b) Browse the file to view as web page
(c) Open any text editor i.e Notepad
Ans: (c), (e), (a), (d), (b)
(d) Open the bowser (e) Write appropriate HTML code.
2. The code for adding java applet.
(a) <applet code= Javaapplet.class>
(b) <html>
(c) </html>
(d) </applet>
(e) </body>
(f) <body>
(a) <img src=a.gif>
(b) </a>
(c) </body>
(d) <a href=france.htm>
(e) <body>
Ans: (b), (f), (a), (d), (e), (c)
3. Rearrange the following
Ans: (e), (d), (a), (b), (c)
4. Rearrange the following
(a) </th>
(b) <table>
(c) Information Technology
(e) <tr>
(f) </tr>
(g) </table>
(d) <th>
Ans: (b), (e), (d), (c), (a), (f), (g)
5. Rearrange the following
(a) <ol type=I>
(b) <li> <b> Web application<b></li>
(c) <li> A. Basic Tags <li>
(d) <ol type= 1>
(d) <li> B. Frame </li>
(g) <li> C. Hyperlinks </li>.
(f) </ol>
Ans: (a), (b), (d), (c), (e), (g), (f)
6. Rearrange the following
(a) <html><body>
(b) <table border=1>
(c)<tr><td>I</td><td>sac</td><td>23</td></tr>
(d) <tr><td>2</td>
(e) <td> raj </td><td>24</td></tr></table></body></hrml>
(f) <tr><th>Sr </th><th> Name</th><th>Age </th></tr>
(g)<tr><thcolspan=3>Student</th></tr>
Ans: (a), (b), (g), (f), (c), (d), (e)
7. Rearrange the following for the table containing image.
(a) <td>
(b) <img src=exam.bmp>
(e) <table border=1>
(c) <body>
(f) </table></body>
(d) </td></tr>
(g) <tr>
Ans: (c), (e), (g), (a), (b), (d), (f)
8. The code for displaying ordered list
(a) <head>
(b) <html>
(c) </head>
(g) </ol>
(h) <li> Fusion
(d) <body>
(e) </html>
(f) <ol>
(c) </html>
(d) <html>
(i) </body>
Ans: (b), (a), (c), (d), (f), (h), (g), (i), (e)
9. The code for inserting background image
(a) </body>
Ans: (d), (b), (a), (c)
(b) <body background=clouds.jpg>